FortiGuard Labs is aware a path-traversal vulnerability (CVE-2022-0902) that affects ABB Totalflow flow computers and remote controllers widely used by oil and gas utility companies. Successfully exploiting the vulnerability allows an attacker to inject and execute arbitrary code. The vulnerability is a path-traversal vulnerability in ABB Totalflow flow computers and remote controllers.Why is this Significant?This is significant because the new vulnerability (CVE-2022-0902) affects ABB TotalFlow flow computers and remote controllers widely used by oil and gas utility companies. ABB TotalFlow is used to calculate oil and gas volume and flow rates and is also used for billing and other purposes.By successfully exploiting the vulnerability, an attacker may be able to hinder affected oil and gas companies’ abilities to correctly measure oil and gas flow, which may lead to safety issues and interruption of business.What is CVE-2022-0902?CVE-2022-0902 is a path-traversal vulnerability (CVE-2022-0902) in ABB TotalFlow flow computers and remote controllers. The vulnerability allows an attacker to gain access to restricted directories in ABB flow computers leading to arbitrary code execution in an affected system node.CVE-2022-0902 has a CVSS score of 8.1.What Products are Affected by the Vulnerability?According to the advisory issued by ABB, the following products are affected by the vulnerability:• RMC-100• RMC100L ITE• XIO• XFCG5• XRCG5• uFLOG5• UDCAll versions of the products without the latest update are vulnerable to CVE-2022-0902.Is CVE-2022-0902 being Exploited in the Wild?FortiGuard Labs is not aware that CVE-2022-0902 is exploited in the wild.Has the Vendor Released an Advisory?Yes. Please see the Appendix for a link to “ABB Flow Computer and Remote Controllers Path Traversal Vulnerability in Totalflow TCP protocol can lead to root access CVE ID: CVE-2022-0902”.Has the Vendor Released a Patch?Yes, the vendor released a firmware update.What is the Status of Protection?FortiGuard Labs is currently investigating protection for CVE-2022-0902. We will update this Threat Signal when protection becomes available.Any Suggested Mitigation?The advisory issued by ABB includes mitigation and workarounds information. See the Appendix for a link to “ABB Flow Computer and Remote Controllers Path Traversal Vulnerability in Totalflow TCP protocol can lead to root access CVE ID: CVE-2022-0902”.
Category Archives: Advisories
DSA-5282 firefox-esr – security update
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, information disclosure, spoofing or bypass of the SameSite cookie
policy.
CVE-2021-4241
A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function setUserLoggedIn of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is bb10a5f3c68527c58073258cb12446782d223bc3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213744.
CVE-2021-4240
A vulnerability, which was classified as problematic, was found in phpservermon. This affects the function generatePasswordResetToken of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is 3daa804d5f56c55b3ae13bfac368bb84ec632193. It is recommended to apply a patch to fix this issue. The identifier VDB-213717 was assigned to this vulnerability.
drupal7-context-3.11-1.fc35
FEDORA-2022-288e2fa22b
Packages in this update:
drupal7-context-3.11-1.fc35
Update description:
https://www.drupal.org/project/context/releases/7.x-3.11
SA-CONTRIB-2022-049
drupal7-context-3.11-1.el7
FEDORA-EPEL-2022-aa5b185b7b
Packages in this update:
drupal7-context-3.11-1.el7
Update description:
https://www.drupal.org/project/context/releases/7.x-3.11
SA-CONTRIB-2022-049
drupal7-context-3.11-1.fc36
FEDORA-2022-12b13cd79f
Packages in this update:
drupal7-context-3.11-1.fc36
Update description:
https://www.drupal.org/project/context/releases/7.x-3.11
SA-CONTRIB-2022-049
drupal7-context-3.11-1.fc37
FEDORA-2022-50482009d5
Packages in this update:
drupal7-context-3.11-1.fc37
Update description:
https://www.drupal.org/project/context/releases/7.x-3.11
SA-CONTRIB-2022-049
drupal7-link-1.11-1.fc35
FEDORA-2022-74fe01686a
Packages in this update:
drupal7-link-1.11-1.fc35
Update description:
https://www.drupal.org/project/link/releases/7.x-1.11
SA-CONTRIB-2022-034
https://www.drupal.org/project/link/releases/7.x-1.10
https://www.drupal.org/project/link/releases/7.x-1.9
https://www.drupal.org/project/link/releases/7.x-1.8
drupal7-link-1.11-1.fc36
FEDORA-2022-d209710a36
Packages in this update:
drupal7-link-1.11-1.fc36
Update description:
https://www.drupal.org/project/link/releases/7.x-1.11
SA-CONTRIB-2022-034
https://www.drupal.org/project/link/releases/7.x-1.10
https://www.drupal.org/project/link/releases/7.x-1.9
https://www.drupal.org/project/link/releases/7.x-1.8